Stefan Lindskog – Publications

2014

78. Ulf E. Larson, Erland Jonsson, and Stefan Lindskog. “Guidance for Selecting Data Collection Mechanisms for Intrusion Detection”. In Handbook of Research on Emerging Developments in Data Privacy, IGI Global, Hershey, PA, USA, 2014. To appear.

77. Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, and Edgar Weippl. Spoiled Onions: Exposing Malicious Tor Exit Relays”. In Proceedings of The 14th Privacy Enhancing Technologies Symposium (PETS 2014), pages 304331, Amsterdam, The Netherlands, July 16–18, 2014. Lecture Notes in Computer Science (LNCS), volume 8555, Springer-Verlag Berlin Heidelberg. [Full text]

2013

76. Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog. “Performance Analysis and Improvement of PR-SCTP for Small Messages”. Computer Networks, volume 57, issue 18, Pages 3967–3986, Elsevier, December 2013. [Full text]

75. Reine Lundin and Stefan Lindskog. “On Entropy of Selectively Encrypted Bitmap Images using Information Neighborhoods”. Journal of Information Assurance and Security (JIAS), volume 8, issue 2, pages 86–96, 2013. [Full text]

2012

74. Reine Lundin and Stefan Lindskog. “An Investigation of Entropy of Selectively Encrypted Bitmap Images”. In Proceedings of the Fourth International Conference on Computational Aspects of Social Networks (CASoN 2012), pages 238–243, São Carlos, Brazil, November 21–23, 2012. IEEE. [Full text]

73. Philipp Winter and Stefan Lindskog. “How the Great Firewall of China is Blocking Tor”. In Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI '12), pages 1–7, Bellevue, WA, USA, August 6, 2012. [Full text]

72. Reine Lundin and Stefan Lindskog. “Changes in Guesswork over Time in Multi-processor Attacks”. Journal of Information Assurance and Security (JIAS), volume 7, issue 4, pages 241–251, 2012. [Full text]

71. Philipp Winter and Stefan Lindskog. “How China is Blocking Tor”. Technical Report, Department of Computer Science, Karlstad University, Karlstad, Sweden, April 2012. [Full text]

2011

70. Reine Lundin and Stefan Lindskog. “Guesswork Changes in Multi-processor Attacks”. In Proceedings of the 7th International Conference on Information Assurance and Security (IAS 2011), pages 145–150, Malacca, Malaysia, December 5–8, 2011. IEEE. [Abstract and full text]

69. Ulf E. Larson, Erland Jonsson, and Stefan Lindskog. “A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection”. In Peyman Kabiri, editor, Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, pages 1–39. IGI Global, Hershey, PA, USA, 2011.

68. Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog. “Data Modeling and Transport of Syslog Messages”. In Proceedings of the 7th Swedish National Computer Networking Workshop (SNCNW 2011), Linköping, Sweden, June 13–14, 2011.

67. Reine Lundin and Stefan Lindskog. “Entropy of Selectively Encrypted Strings”. In Proceedings of the 5th Workshop in Information Security Theory and Practice (WISTP 2011), pages 234243, Heraklion, Crete, Greece, June 1–3, 2011. Lecture Notes in Computer Science (LNCS), volume 6633, Springer-Verlag Berlin Heidelberg. [Abstract and full text]

66. Mohammad Rajiullah, Reine Lundin, Anna Brunstrom, and Stefan Lindskog. “Syslog Performance: Data Modeling and Transport”. In Proceedings of the 3rd International Workshop on Security and Communication Networks (IWSCN 2011), pages 31–37, Gjøvik, Norway, May 18–20, 2011. IEEE.

65. Reine Lundin and Stefan Lindskog. “Joint and Conditional Guesswork: Definitions and Implications”. Journal of Information Assurance and Security (JIAS), volume 6, issue 2, pages 89–97, 2011. [Abstract and full text]

2010

64. Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “Security Solution Suitability Analysis using Modified Multiplicative Analytic Hierarchy Process”. In Proceedings of IEEE GLOBECOM 2010 – Workshop on Mobile Computing and Emerging Communication Networks 2010 (MCECN 2010), pages 1248–1253 Miami, FL, USA, December 6–10, 2010. IEEE. [Abstract and full text]

63. Mohammad Rajiullah, Anna Brunstrom, and Stefan Lindskog. “Priority Based Delivery of PR-SCTP Messages in a Syslog Context”. In Proceedings of the 5th International ICST Conference on Access Networks (AccessNets 2010), pages 299–310, Budapest, Hungary, November 3–5, 2010. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Springer-Verlag Berlin Heidelberg. [Abstract and full text]

62. Reine Lundin and Stefan Lindskog. “Security Implications of Selective Encryption”. In Proceedings of the 6th International Workshop on Security Measurements and Metrics (MetriSec 2010), Bolzano-Bozen, Italy, September 15, 2010. ACM. [Abstract and full text]

61. Reine Lundin and Stefan Lindskog. “Extending the Definition of Guesswork”. In Proceedings of the 6th International Conference on Information Assurance and Security (IAS 2010), pages 191–196, Atlanta, GA, USA, August 23–25, 2010. IEEE. [Abstract and full text]

60. Anas Abou El Kalam, Andrea Atzeni, Stefan Lindskog, Daniele Mazzocchi, Claudio Pastrone, Khalid Salih, Maurizio A. Spirito, and Olivier Terzo. “Security Evaluation Framework for 6LoWPAN Networks”. NEWCOM++ Dissemination Day, Florence, Italy, June 18, 2010. [Poster]

59. Anna Brunstrom and Stefan Lindskog (editors). “Proceedings of the 2nd International Workshop on Security and Communication Networks (IWSCN 2010)”, Karlstad, Sweden, May 26–28, 2010. IEEE. [Foreword | Table of contents]

58. Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “Performance Evaluation of IKEv2 Authentication Methods in Next Generation Wireless Networks”. Journal of Security and Communication Networks, volume 3, issue 1, pages 83–98, Wiley, January/February 2010. [Abstract | Full text]

2009

57. Stefan Lindskog and Anna Brunstrom. “The Design and Implementation of Secure Socket SCTP”. Transactions on Computational Science VI, pages 180–199, December 2009. Lecture Notes in Computer Science (LNCS), volume 5730, Springer-Verlag Berlin Heidelberg. [Abstract | Full text]

56. Ulf E. Larson, Stefan Lindskog, Dennis K. Nilsson, and Erland Jonsson. “A System Architecture for Operator-Centric and Adaptive Intrusion Detection”. Journal of Information Assurance and Security (JIAS), volume 4, issue 3, pages 236–246, June 2009. [Abstract | Full text]

55. Ulf E. Larson, Dennis K. Nilsson, Erland Jonsson, and Stefan Lindskog. “Using System Call Information to Reveal Hidden Attack Manifestations”. In Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN 2009), pages 123–130, Trondheim, Norway, May 20–22, 2009. IEEE. [Abstract and full text]

54. Svein J. Knapskog and Stefan Lindskog (editors). “Proceedings of the 1st International Workshop on Security and Communication Networks (IWSCN 2009)”, Trondheim, Norway, May 20–22, 2009. IEEE. [Foreword | Table of contents]

53. Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “A Measurement Study on IKEv2 Authentication Performance in Wireless Networks”. In Proceedings of the 6th Swedish National Computer Networking Workshop (SNCNW 2009), Uppsala, Sweden, May 4–5, 2009. [Abstract | Full text | Poster]

52. Anas Abou El Kalam, Andrea Atzeni, Alberto Cappadonia, Emanuele Cesena, Simone Fischer-Hübner, Stefan Lindskog, Leonardo A. Martucci, and Claudio Pastrone. “Toward a Formal Framework to Evaluate Wireless Sensor Network Security”. In Proceedings of NEWCOM++/ACoRN Joint Workshop 2009, Barcelona, Spain, March 30–April 1, 2009. [Abstract | Full text]

2008

51. Stefan Lindskog and Anna Brunstrom. “Secure Socket SCTP: A Multi-layer End-to-End Security Solution”. Extended abstract presented at the 1st Euro-NF Socio-Economics Workshop, Athens, Greece, October 16–17, 2008. [Extended abstract]

50. Ulf E. Larson, Stefan Lindskog, Dennis K. Nilsson, and Erland Jonsson. “Decision Support for Intrusion Detection Data Collection”. In Proceedings of the 13th Nordic Workshop on Secure IT Systems (NordSec 2008), pages 95–108, Copenhagen, Denmark, October 9–10, 2008. [Abstract | Full text]

49. Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “Experimental Evaluation of the Performance Costs of Different IKEv2 Authentication Methods”. In Proceedings of the 13th International Telecommunications Network Strategy and Planning Symposium (Networks 2008), Budapest, Hungary, September 28–October 2, 2008. IEEE. [Abstract | Full text]

48. Ulf E. Larson, Stefan Lindskog, Dennis K. Nilsson, and Erland Jonsson. “Operator-Centric and Adaptive Intrusion Detection”. In Proceedings of the 4th International Conference on Information Assurance and Security (IAS 2008), pages 161–166, Naples, Italy, September 8–10, 2008. IEEE. [Abstract | Full text]

47. Stefan Lindskog, Anna Brunstrom, and Zoltán Faigl. “Tunable Security Services for Wireless Networks”. In Mohamed Ibnkahla, editor, Adaptation and Cross Layer Design in Wireless Networks, chapter 15, pages 451–480. CRC, USA, August 2008. [Abstract]

46. Ulf E. Larson, Erland Jonsson, and Stefan Lindskog. “A Structured Overview of Data Collection with a Focus on Intrusion Detection”. Technical Report 2008–19, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, August 2008. [Abstract]

45. Stefan Lindskog and Anna Brunstrom. “The Design and Message Complexity of Secure Socket SCTP”. In Proceedings of the 2008 International Conference on Computational Science and Its Applications (ICCSA 2008), part II, pages 484–499, Perugia, Italy, June 30–July 3, 2008. Lecture Notes in Computer Science (LNCS), volume 5073, Springer-Verlag Berlin Heidelberg 2008. [Abstract | Full text]

44. Reine Lundin, Stefan Lindskog, and Anna Brunstrom. “A Model-based Analysis of Tunability in Privacy Services”. In Simone Fischer-Hübner, Penny Duquenoy, Albin Zuccato, and Leonardo Martucci, editors, The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, pages 343–356. IFIP International Federation for Information Processing, volume 262, Springer, USA, June 2008. [Abstract]

43. Zoltán Faigl, Péter Fazekas, Stefan Lindskog, and Anna Brunstrom. “Analytical Analysis of the Performance Overheads of IPsec in Mobile IPv6 Scenarios”. In István Frigyes, Janos Bito, and Péter Bakki, editors, Advances in Mobile and Wireless Communications: Views of the 16th IST Mobile and Wireless Communication Summit, pages 365–385. Lecture Notes in Electrical Engineering (LNEE), volume 16, Springer-Verlag Berlin Heidelberg 2008. [Full text]

42. Stefan Lindskog, Zoltán Faigl, and Anna Brunstrom. “A Conceptual Model for Analysis and Design of Tunable Security Services”. Journal of Networks, volume 3, number 5, pages 1–12, May 2008. [Abstract | Full text]

41. Stefan Lindskog and Anna Brunstrom. “A Comparison of End-to-End Security Solutions for SCTP”. In Proceedings of the 5th Swedish National Computer Networking Workshop (SNCNW 2008), Karlskrona, Sweden, April 9–10, 2008. [Abstract | Full text | Poster]

40. Ulf E. Larson, Erland Jonsson, and Stefan Lindskog. “A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection”. In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008), pages 624–629, Barcelona, Spain, March 4–7, 2008. IEEE. [Abstract | Full text]

39. Stefan Lindskog and Anna Brunstrom. “An End-to-End Security Solution for SCTP”. In Proceedings of the Third International Conference on Availability, Reliability and Security (ARES 2008), pages 526–531, Barcelona, Spain, March 4–7, 2008. IEEE. [Abstract | Full text]

2007

38. Zoltán Faigl, Stefan Lindskog, and Anna Brunstrom. “Analyzing IKEv2 Performance when Protecting Mobile IPv6 Signaling”. In Proceedings of 4th International Symposium on Wireless Communication Systems (ISWCS 2007), pages 390–395, Trondheim, Norway, October 17–19, 2007. IEEE. [Abstract | Full text]

37. Reine Lundin, Stefan Lindskog, and Anna Brunstrom. “Analysis of Anonymity Services from a Tunable Perspective”. In Proceedings of the Third IFIP/FIDIS Summer School on the Future of Identity in the Information Society. Karlstad University, Sweden, August 6–10, 2007. [Abstract | Full text]

36. Zoltán Faigl, Péter Fazekas, Stefan Lindskog, and Anna Brunstrom. “Performance Analysis of IPsec in MIPv6 Scenarios”. In Proceedings of the Sixteenth IST Mobile & Wireless Communication Summit, Budapest, Hungary, July 1–5, 2007. IEEE. [Abstract | Full text]

35. Stefan Lindskog, Hans Hedbom, Leonardo A. Martucci, and Simone Fischer-Hübner. “Experiences from Educating Practitioners in Vulnerability Analysis”. In Lynn Futcher and Ronald Dodge, editors, Proceedings of the 5th World Information Security in Education Workshop (WISE'5), pages 73–80, West Point, NY, USA, June 19–21, 2007. IFIP International Federation for Information Processing, volume 237, Springer. [Abstract]

34. Reine Lundin, Thijs Holleboom, and Stefan Lindskog. “On the Relationship between Confidentiality Measures: Entropy and Guesswork”. In Proceedings of the Fifth International Workshop on Security in Information Systems (WOSIS 2007), pages 135–144, Funchal, Madeira, Portugal, June 12–13, 2007. INSTICC. [Abstract]

33. Carin Andersson and Stefan Lindskog. “Survey and Analysis of Project Management Competence within Research Projects at Karlstad University”. Master’s thesis, Department of Information Systems, Karlstad University, Sweden, June 2007. [Abstract]

2006

32. Zoltán Faigl, Stefan Lindskog, Anna Brunstrom, and Katalin Tóth. “Providing Tunable Security in IEEE 802.11i Enabled Networks”. Karlstad University Studies 2006:72, Sweden, 2006. [Abstract | Full text]

31. Stefan Lindskog, Anna Brunstrom, and Zoltán Faigl. “Analyzing Tunable Security Services”. In Proceedings of the Fourth Swedish National Computer Networking Workshop (SNCNW 2006), Luleå, Sweden, October 26–27, 2006. [Abstract | Full text | Poster]

30. Stefan Lindskog, Anna Brunstrom, Reine Lundin, and Zoltán Faigl. “A Conceptual Model of Tunable Security Services”. In Proceedings of the Third International Symposium on Wireless Communication Systems (ISWCS 2006), pages 531–535, Valencia, Spain, September 5–8, 2006. IEEE. [Abstract | Full text]

29. Stefan Lindskog, Anna Brunstrom, Zoltán Faigl, and Katalin Tóth. “Providing Tunable Security Services: An IEEE 802.11i Example”. In Proceedings of the First Workshop on Enterprise Network Security (WENS 2006), Baltimore, MD, USA, August 28, 2006. IEEE. [Abstract | Full text]

28. Reine Lundin, Stefan Lindskog, Anna Brunstrom, and Simone Fischer-Hübner. “Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages”. In Dieter Gollmann, Fabio Massacci, and Artsiom Yautsiukhin, editors, Quality of Protection: Security Measurements and Metrics, pages 173–184. Advances in Information Security, volume 23, Springer, USA, August 10, 2006. [Abstract]

27. Lucio Ferreira, Jordi Perez-Romero, Velio Tralli, Peter Fazekas, Miquel Oliver, Stefan Lindskog, and Ramón Agustí. “QoS Provision in Wireless Networks: Mobility, Security, and Radio Resource Management: An Overview”. Presented at IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, June 11–15, 2006. [Presentation]

26. Stefan Lindskog, Anna Brunstrom, Zoltán Faigl, and Katalin Tóth. “Providing Tunable Security Services”. Poster abstract presented at the High Speed Network Workshop 2006 (HSN 2006), Budapest, Hungary, May 23, 2006. [Poster]

25. Stefan Lindskog, Reine Lundin, and Anna Brunstrom. “Middleware Support for Tunable Encryption”. In Proceedings of the Fifth International Workshop on Wireless Information Systems (WIS 2006), pages 36–46, Paphos, Cyprus, May 23, 2006. INSTICC. [Abstract]

24. Simone Fischer-Hübner, Kai Rannenberg, Louise Yngström, and Stefan Lindskog (Editors). “Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006)”, Karlstad, Sweden, May 22–24, 2006.  IFIP International Federation for Information Processing, volume 201, Springer. [Foreword]

23. Leonardo A. Martucci, Hans Hedbom, Stefan Lindskog, and Simone Fischer-Hübner. “Educating System Testers in Vulnerability Analysis: Laboratory Development and Deployment”. In Proceedings of the Seventh Workshop on Education in Computer Security (WECS7), pages 51–65, Naval Postgraduate School, Monterey, CA, USA, January 4–6, 2006. [Abstract | Full text]

2005

22. Stefan Lindskog and Anna Brunstrom. “Tunable Security Support for Wireless Applications”. In Proceedings of the Third Swedish National Computer Networking Workshop (SNCNW 2005), pages 44–47, Halmstad, Sweden, November 23–24, 2005. [Abstract | Full text | Poster]

21. Reine Lundin, Stefan Lindskog, Anna Brunstrom, and Simone Fischer-Hübner. “Measuring Confidentiality of Selectively Encrypted Messages Using Guesswork”. In Proceedings of the Third Swedish National Computer Networking Workshop (SNCNW 2005), pages 99–102, Halmstad, Sweden, November 23–24, 2005. [Abstract | Full text]

20. Stefan Lindskog and Anna Brunstrom. “Design and Implementation of a Tunable Encryption Service for Networked Applications”. In Proceedings of the First IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks (SecQoS 2005), pages 258–266, Athens, Greece, September 9, 2005. IEEE. [Abstract | Full text]

19. Stefan Lindskog, Karl-Johan Grinnemo, and Anna Brunstrom. “Data Protection based on Physical Separation: Concepts and Application Scenarios”. In Proceedings of the 2005 International Conference on Computational Science and Its Applications (ICCSA 2005), part IV, pages 1331–1340. Singapore, May 9–12, 2005. Lecture Notes in Computer Science (LNCS), volume 3483, Springer-Verlag Berlin Heidelberg 2005. [Abstract | Full text]

18. Stefan Lindskog, Anna Brunstrom, and Erland Jonsson. “Survey and Classification of Dynamic Data Protection Services for Network Applications”. In Janis Bubenko jr, Owen Eriksson, Hans Fernlund, and Mikael Lind (Editors), Proceedings of the Fifth Conference for the Promotion of Research in IT at New Universities and University Colleges in Sweden (Promote IT 2005), pages 297–306, Studentlitteratur, Sweden, May 2005. [Abstract]

17. Stefan Lindskog. “Modeling and Tuning Security from a Quality of Service Perspective”. PhD thesis, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, April 2005. [Abstract | Full text]

2004

16. Stefan Lindskog, Karl-Johan Grinnemo, and Anna Brunstrom. “Physical Separation for Data Protection based on SCTP Multihoming”. In Proceedings of the Second Swedish National Computer Networking Workshop (SNCNW 2004), Karlstad, Sweden, November 23–24, 2004. [Abstract | Full text]

15. Stefan Lindskog, Anna Brunstrom, and Erland Jonsson. “Dynamic Data Protection Services for Network Transfers: Concepts and Taxonomy”. In Proceedings of the Fourth Annual Information Security South Africa Conference (ISSA 2004), Johannesburg, South Africa, June 30–July 2, 2004. [Abstract | Full text]

14. Stefan Lindskog and Erland Jonsson. “Adding Security to QoS Architectures”. In Robert Burnett, Anna Brunstrom, and Anders G. Nilsson (Editors), Perspectives on Multimedia: Communication, Media and Information Technology, chapter 8, pages 145–158, John Wiley & Sons, UK, June 2004. [Abstract]

13. Stefan Lindskog, Johan Strandbergh, Mikael Hackman, and Erland Jonsson. “A Content-Independent Scalable Encryption Model”. In Proceedings of the 2004 International Conference on Computational Science and Its Applications (ICCSA 2004), part I, pages 821–830, Assisi, Italy, May 14–17, 2004. Lecture Notes in Computer Science (LNCS), volume 3043, Springer-Verlag Berlin Heidelberg 2004 [Abstract | Full text]

12. Janis Bubenko jr, Simone Fischer-Hübner, Stefan Lindskog, and Anders G. Nilsson (Editors). “Proceedings of the Fourth Conference for the Promotion of Research in IT at New Universities and University Colleges in Sweden (Promote IT 2004)”, part 1 & 2, Karlstad University Studies, Sweden, May 5–7, 2004. [Foreword]

2003–2000

11. Helena Lindskog and Stefan Lindskog. “Web Site Privacy with P3P”. John Wiley & Sons, USA, March 2003. [Summary]

10. Stefan Lindskog and Erland Jonsson. “Adding Security to Quality of Service Architectures”. In Proceedings of the Scuola Superiore G. Reiss Romoli 2002 Summer Conference (SSGRR-2002s), L’Aquila, Italy, July 29–August 4, 2002. [Abstract | Full text]

9.   Stefan Lindskog and Erland Jonsson. “Different Aspects of Security Problems in Network Operating Systems”. In Proceedings of the Third Annual International Systems Security Engineering Association Conference (2002 ISSEA Conference), Orlando, FL, USA, March 13–15, 2002. [Abstract | Full text]

8.   Hans Hedbom, Stefan Lindskog, and Erland Jonsson. “Risks and Dangers of Security Extensions” In Proceedings of Security and Control of IT in Society-II (IFIP SCITS-II), pages 231–248, Bratislava, Slovakia, June 15–16, 2001. [Abstract | Full text]

7.   Stefan Lindskog. “Observations on Operating System Security Vulnerabilities”. Licentiate thesis, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden, February 2000. [Abstract | Full text]

1999 and Earlier

6.   Stefan Lindskog, Ulf Gustafson, and Erland Jonsson. “Security Evolution of a Network Operating System”. In Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NordSec 1999), Stockholm, Sweden, November 1–2, 1999. [Abstract | Full text]

5.   Erland Jonsson, Lars Strömberg, and Stefan Lindskog. “On the Functional Relation between Security and Dependability Impairments”. In Proceedings of the New Security Paradigms Workshop 1999 (NSPW 1999), pages 104–111, Ontario, Canada, September 22–24, 1999. ACM. [Abstract | Full text]

4.   Stefan Lindskog, Ulf Lindqvist, and Erland Jonsson. “IT Security Research and Education in Synergy”. In Proceedings of the First World Conference on Information Security Education (WISE'1), pages 145–162, Stockholm, Sweden, June 17–19, 1999. [Abstract | Full text]

3.   Stefan Lindskog, Hans Hedbom, and Erland Jonsson. “An Analysis of the Security of Windows NT”. Technical report 1999–16, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden, 1999. [Abstract | Full text]

2.   Hans Hedbom, Stefan Lindskog, Stefan Axelsson, and Erland Jonsson. “A Comparison of the Security of Windows NT and UNIX”. In Svein J. Knapskog and Tønnes Brekne, editors, Proceedings of the Third Nordic Workshop on Secure IT Systems (NordSec 1998), Trondheim, Norway, November 5–6, 1998. [Abstract | Full text]

1.   Hans Hedbom, Stefan Lindskog, and Erland Jonsson. “A Preliminary Evaluation of the Security of a Non-Distributed Version of Windows NT”. In Arto Karila and Timo Aalto, editors, Proceedings of the Second Nordic Workshop on Secure Computer Systems (NordSec 1997), Espoo, Finland, November 6–7, 1997. [Abstract | Full text]